Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 00:42
Behavioral task
behavioral1
Sample
d4c7593d7fbcb92ff13045613c48e4cd.exe
Resource
win7-20240221-en
General
-
Target
d4c7593d7fbcb92ff13045613c48e4cd.exe
-
Size
191KB
-
MD5
d4c7593d7fbcb92ff13045613c48e4cd
-
SHA1
f1d4e5e9467d9f2f895e699ec02c1b60616cda31
-
SHA256
fb66ca74d8bfa137682aa994a89b7a0889467a3013f404b981617b5ff2aaa7db
-
SHA512
d378a7a698cf8bdfedc177e47a68534c0f3cf44f652dc0d7fa6f419066b3e4d332f4322831168173d16275fe3c60dddd82059644d1e9d63966ae3636213688a5
-
SSDEEP
3072:FdTejYQcRkBtZy/kqtcGxekIQ8bqJLSjDexH0THKLW15Y5dyO5SDLm9qJV8Vd1v7:PWfUkBPyrtBxgQTMK0TKpxS3H8j0bg
Malware Config
Signatures
-
Downloads MZ/PE file
-
resource yara_rule behavioral2/memory/3160-0-0x0000000000400000-0x000000000056B000-memory.dmp upx behavioral2/memory/3160-72-0x0000000000400000-0x000000000056B000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d4c7593d7fbcb92ff13045613c48e4cd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 142567.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4776 msedge.exe 4776 msedge.exe 3496 msedge.exe 3496 msedge.exe 3596 identity_helper.exe 3596 identity_helper.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3160 d4c7593d7fbcb92ff13045613c48e4cd.exe 3160 d4c7593d7fbcb92ff13045613c48e4cd.exe 3160 d4c7593d7fbcb92ff13045613c48e4cd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3160 wrote to memory of 3496 3160 d4c7593d7fbcb92ff13045613c48e4cd.exe 90 PID 3160 wrote to memory of 3496 3160 d4c7593d7fbcb92ff13045613c48e4cd.exe 90 PID 3496 wrote to memory of 3456 3496 msedge.exe 91 PID 3496 wrote to memory of 3456 3496 msedge.exe 91 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 4776 3496 msedge.exe 95 PID 3496 wrote to memory of 4776 3496 msedge.exe 95 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4c7593d7fbcb92ff13045613c48e4cd.exe"C:\Users\Admin\AppData\Local\Temp\d4c7593d7fbcb92ff13045613c48e4cd.exe"1⤵
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.bigfishgames.com/download-games/1305/mystery-case-files-ravenhearst/download.html?afcode=af628d3a27a22⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff971a346f8,0x7ff971a34708,0x7ff971a347183⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:23⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:83⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:13⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:13⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:13⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:13⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4136 /prefetch:83⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:13⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:83⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6320 /prefetch:83⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:13⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:13⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
393B
MD515e1378becaea2b06b5257d4a5fa62e9
SHA1baff2300e206d7e2a3e3312550852110821fb967
SHA256bd93751c0495ca0f9b5bd95413ef604ae99bc4edc77485368188ec967fd6f358
SHA512a027de0a6041d18706527252c24697ffe1d8259ea674bbca1121523f4dab7ea27fdc8a6b3d0d38009c0811738ae3919c04bec251d146a56ecfab3ab74484d20c
-
Filesize
6KB
MD5dc795e382f10c777453eaa3cb21eee4d
SHA1b8ec638ff33a8f04d17dc40697d7d6d5c0b76ebe
SHA256430b5d068fd287b2c58aab3adbfcd06356ece3695e2eb5ff0b26f1babab6dcf4
SHA5125775d501913b77b6f2922fb0d267a21fd39de77c32020bec34b92ed842508d54466d4c0a2573571149dd3c18331574efbf4d1ded2493d5d4f8668d4d48478aaa
-
Filesize
6KB
MD5941a002a389eb6e35715c45774618c4e
SHA107b595c38933101434af357b48b7dd27eefd8d48
SHA256af1631550bcad7cc86b03f79c68931222bf920c5b1ed58fc88a04fa61e0cf275
SHA5127a06121ad5d56b77b993f97c353c398b2d4c2e26b8199299011a4a8a826ba87b8fa08674d4b2d6ceeca24ad2cd761dcb20728c997b931789472e5d882d299c53
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51cbb18a80429e77562fe5796197c2387
SHA11348fd8ed3b7c2710da8d937d80db4fcbe411907
SHA2569b3803adbad49d306ab80cf27094a563a373a2cc3324af670328de4592f91dde
SHA512371154280bddf86ac9fde5c642e44ada65337d46033ebf2d5b058ba9d9f9eb06cd6bd829a4c8f9bee36b3811c64feb2f7306b776a585f69fd892c6ac4ee81389
-
Filesize
192B
MD5b32e479bd009ed83990c9673269a8679
SHA1c90602796792d73b8e14df593d28c88639957537
SHA2564da0710275fe2edc624ceae921dfed794450221c88daaac73467fc885cff1a3b
SHA512d29415020d7ddc493ac36ad2351414523f9804f3031a50c6bfded58d8b9a83f13877ae73571e9dcc50eedd7014230196313dfab8618e587e118ae6ba4d94db12
-
Filesize
1KB
MD5a4bd461ab4beb5521ab483be7f8b84c6
SHA16ef97d662484d81ec0777472b7866cbf1dcbd7d5
SHA2569a136e7bd6022cc073f7b79768a686f6b3dec96a02b49c8d8d71e3ae21d28a2b
SHA5123c5daee71cefc11b08a5e558e4e2f4b3c16326d05fe565566c20bca8d4cc5f2312759c4faaeb2c46f19c5a0b14839a02f9d3806c1a07505159340e4334e2959f